Veeam Blog
Filters (Results: 1576)
Results: 1576
Filters (Results: 1576)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Cyber Chat: Use strong passwords and keep them secure

Similar to most families in the Northern Hemisphere, besides being Cybersecurity Awareness Month, October is also a time of year where scary movies and pumpkin patches take centerstage. For us, we recently took our kids to pick pumpkins still on the vine, suffer through a very bumpy hayride and line up against the eight foot ruler to see “How Tall this Fall” our kids were. All of these activities were free (besides paying for the pumpkins themselves).   Read more

What Is the Difference Between Backup and Recovery?

When people hear the words backup and recovery, they often think they’re interchangeable. In reality, they’re two sides of the same coin: one protects your data before disaster strikes, and the other gets it back after. Understanding the difference is more than a matter of definitions; it’s a cornerstone of building a resilient IT strategy. Read more

Veeam resources you need to be aware of – part 2

About a year ago, I published a blog sharing Veeam resources you need to be aware of. It was my hope that this would become an on-going series where I would highlight new resources that become available. Well, I am thrilled to be sharing with you “Part 2” of Veeam resources you need to be aware of. Read more
Chris McDonald
Chris McDonald

Senior Systems Engineer

Cyber Chat – What Jurassic World Can Teach About Multi-Factor Authentication

My family and I have recently started a weekly dinner and a movie routine, where we base the dinner menu around the characters or premise of the movie. For us, we’re counting down to an upcoming family trip, but I’m hoping to keep up this fun routine even after our trip. The excitement of the kids picking an envelope as we all watch with excitement to see which movie we will be watching that week — and the same anticipation from mom and dad to see what type of food they will need to prepare in the coming days. Oh, the fun of family traditions… but now to the security part of this story.  Read more

Cyber Chat – Welcome to Cybersecurity Awareness Month

The other day, I was watching a local junior high school soccer match. One team was advancing down the field as the forward was calling out to his teammates where to go and who to cover. The other team was all crowded together just trying to get the ball. One team was focused on their strategy, while the other team was focused on one short term goal — get the ball. It probably isn’t hard to guess which team came out the victor in that game. The team focused on their short-term goal lost focus on their fundamentals — they didn’t think about what they would do if they got the ball or if their short-term goal wasn’t met and ... Read more

Service Providers: The Veeam difference in BaaS for public cloud

Being a managed service provider offering Backup up as a Service (BaaS) for AWS, Microsoft Azure and Google Cloud can be daunting. You may end up trying to decipher the best solution just by combing through marketplace ads and descriptions. Deciding what’s needed and what’s not needed is crucial to ensure that you provide a cost-effective and efficient backup system that’s not only good for your customer but (let’s be honest) good for you as well. Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

Veeam Backup & Replication: Migrate existing repository volumes of a lost server to a new one

We’ll dive into a disaster scenario in which a Veeam repository server cannot be recovered, but the block storage, used for storing the backups, is still intact and consistent. As an example, a classic situation would be a physical server with hardware that is defective, but the disc shelves or fibre-channel sub-storage system is not affected by the hardware failure. Read more

Why Ransomware Attacks Work and What You Can Do Besides Pay the Ransom

Television and movies would have us believe cybercriminals have to execute complex plans that involve rappelling from rooftops and avoiding lasers to break into our networks. In reality, it only takes a well-crafted email and a distracted person to start a chain of events that can cost millions of dollars to repair. While that seems like a simple problem to solve, multiple layers of security controls needed to fail for the ransomware attack to succeed.  Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Using Kasten K10 RBAC Control

As the leading Kubernetes backup and recovery solution, Kasten K10 by Veeam provides the granular identity and access management controls required to secure your K10 environment and easily provide users with the access their roles require. Read more